Sciweavers

1357 search results - page 37 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
JHSN
2006
267views more  JHSN 2006»
15 years 1 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
SIS
2008
15 years 3 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
90
Voted
JUCS
2007
108views more  JUCS 2007»
15 years 1 months ago
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
: In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed...
Hossein Hojjat, Hootan Nakhost, Marjan Sirjani
IPCCC
2007
IEEE
15 years 8 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
ICALT
2009
IEEE
15 years 8 months ago
Mediating Distribution Models and Access Control for the Exchange of Learning Objects
This paper presents a learning object broker that aims to mediate and control accesses to learning objects offered by the “Learning Resource Exchange”. This broker provides a u...
Jean-Noel Colin, Tien-Dung Le, David Massart